Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such as the 2016 Bangladesh Bank heist and recurring data breaches, reveal that the nation’s security challenges extend beyond technology. This article applies a constructivist theoretical framework to argue that cybersecurity in Bangladesh should be socially constructed through shared meanings, political narratives, and institutional identities rather than determined solely by material capacity. Drawing on the foundational insights of Onuf, Wendt, and Finnemore, it contends that the country’s laws and policies, such as the Information and Communication Technology (ICT) Act (2006) and the Digital Security Act (2018), reflect the internalisation of state-centric norms that privilege control and reputation management over transparency and citizen trust. Through interpretive analysis of policy documents, legislative instruments, and media discourses, the study demonstrates that the prevailing cybersecurity narrative in Bangladesh equates resilience with regime stability and technological modernity. Constructivist reasoning reframes this narrative by highlighting how institutional legitimacy, social trust, and professional identity shape security behaviour. Further, research shows that international frameworks, such as the International Organisation for Standardisation/International Electrotechnical Commission (ISO/IEC) 27001 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, contribute to global norm diffusion but achieve a long-term impact only when locally internalised. Ultimately, the study concludes that Bangladesh’s cybersecurity resilience depends not merely on technological and legislative reforms but on reconstructing the social meanings that underpin governance. By embedding openness, inclusivity, and accountability into institutional culture, Bangladesh can transform cybersecurity from a domain of control into a collective practice of trust and responsibility.
| Published in | Humanities and Social Sciences (Volume 13, Issue 6) |
| DOI | 10.11648/j.hss.20251306.19 |
| Page(s) | 590-599 |
| Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
| Copyright |
Copyright © The Author(s), 2025. Published by Science Publishing Group |
Bangladesh, Cybersecurity, Constructivism, Digital Security Act, ICT Act, Governance, Norm Diffusion
| [1] |
Ministry of Science and Information and Communication Technology. The Information and Communication Technology (ICT) Act, Government of the People’s Republic of Bangladesh, 2006. Available from:
https://samsn.ifj.org/wp-content/uploads/2015/07/Bangladesh-ICT-Act-2006.pdf [Accessed 7 November 2025]. |
| [2] |
Ministry of Law, Justice and Parliamentary Affairs. Digital Security Act, Government of the People’s Republic of Bangladesh, 2018. Available from:
https://basis.org.bd/public/files/policy/5e1653db166e8Digital-Security-Act-2018-English-version.pdf [Accessed 6 October 2025]. |
| [3] |
National Cyber Security Index. Country profile: Bangladesh. e?Governance Academy, 2021. Available from:
https://ncsi.ega.ee/country/bd_2022/ [Accessed 4 October 2025]. |
| [4] | Waxman, M. C. Cyber?Attacks and the Use of Force: Back to the Future of Article 2(4), Yale Journal of International Law. 2011, 36, 421-459. |
| [5] | Wendt, A. Anarchy is What States Make of it: The Social Construction of Power Politics, International Organization. 1992, 46(2), 391-425. |
| [6] |
Wheeler, D. A., Larsen, G. N. Techniques for Cyber?Attack Attribution, Institute for Defense Analyses. 2003. Available from:
https://archive.org/details/DTIC_ADA468859 [Accessed 8 August 2025]. |
| [7] |
Lipson, H. F. Tracking and Tracing Cyber?Attacks: Technical Challenges and Global Policy Issues. Special Report, CMU/SEI-2002-SR-009, Carnegie Mellon University, 2002, 1-71. Available from:
https://www.sei.cmu.edu/documents/1827/2002_003_001_13928.pdf [Accessed 3 August 2025]. |
| [8] | Onuf, N. World of Our Making: Rules and Rule in Social Theory and International Relations. Columbia, South Carolina: University of South Carolina Press, 1989, pp. 1-341. |
| [9] | Hough, P. Understanding Global Security. 3rd ed. London: Routledge; 2013, pp. 1-490. |
| [10] |
The Daily Star, “2 Govt Websites Hacked”, July 2013. Available from:
http://www.thedailystar.net/news/2-govt-websites-hacked [Accessed 1 September 2025]. |
| [11] | Wendt, A. Social Theory of International Politics. Cambridge: Cambridge University Press; 1999, pp. 1-429. |
| [12] | Finnemore, M. National Interests in International Society. Ithaca, NY: Cornell University Press; 1996, pp. 1-180. |
| [13] | Katzenstein, P. J. The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press; 1996, pp. 1-562. |
| [14] | Kabir, S. Global ICT Indicators’ Status in Bangladesh, Bangladesh Bureau of Statistics. 2014, 1-15. |
| [15] |
National Institute of Standards and Technology. Cybersecurity Framework 2.0. Gaithersburg, MD: NIST; 2024, pp. 1-27. Available from:
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf [Accessed 4 September 2025]. |
| [16] |
ISO/IEC 27001: 2022. Information Security, Cybersecurity and Privacy Protection — Information Security Management Systems — Requirements. 2022, Edition 3, 1-19. Available from:
https://www.iso.org/standard/27001 [Accessed 2 November 2025]. |
| [17] | Finnemore, M., Sikkink, K. International Norm Dynamics and Political Change. International Organization. 1998, 52(4), 887-917. |
| [18] |
Ejinsight, “Hackers Lurked in Bangladesh Central Bank’s Servers for Weeks”, March 2016. Available from:
http://www.ejinsight.com/20160322-hackers-lurked-in-bangladesh-central-banks-servers-for-weeks/ [Accessed 5 August 2025]. |
| [19] | Khan, M. S., Barua, S. The State and Threats of Information Security in the Banking Sector of Bangladesh: Policy Required, Bangladesh Journal of MIS. 2009, 1(2), 1-27. |
| [20] |
Rahman, S. ATM Frauds Rattle Banks, Customers, The Daily Star, February 2016. Available from:
http://www.thedailystar.net/business/atm-frauds-rattle-banks-customers-510868 [Accessed 3 August 2025]. |
| [21] |
Bergman, D. Bangladesh Bank Governor Resigns after $81m Hack, Aljazeera, March 2016. Available from:
https://www.aljazeera.com/news/2016/3/15/bangladesh-bank-governor-resigns-after-81m-hack?utm_source=chatgpt.com [Accessed 5 October 2025]. |
| [22] |
Hossain, M. Violence against women rises 74%, News Network, April 2016. Available from:
http://newsnetwork-bd.org/newsletter/2016/04/28/violence-against-women-rises-74/ [Accessed 3 August 2025]. |
| [23] |
Sarker, P., Hasan, M., Akhter, R., Sakir, S. Women’s Rights, Gender and ICTs in Bangladesh, Global Information Society Watch. 2013, 70-72. Available from:
https://giswatch.org/sites/default/files/gisw13_chapters.pdf [Accessed 5 October 2025]. |
| [24] |
Ministry of Science and Information and Communication Technology. National ICT Policy 2009, Government of the People’s Republic of Bangladesh, 2009. Available from:
https://www.scribd.com/document/220439314/ICT-Policy-Bangladesh-2009 [Accessed 3 August 2025]. |
| [25] |
United Nations Development Programme. Access to Information (A2I) Programme ‘Strategic Priorities of Digital Bangladesh’, 2011, 1-265. Available from:
https://www.amtob.org.bd/assets/resource/research_center/Strategic_Priorities_of_Digital_Bangladesh_Jan_2011.pdf [Accessed 9 September 2025]. |
| [26] | Hammer, M., Champy, J. Reengineering the Corporation: A Manifesto for Business Revolution. New York: HarperCollins Publishers, 1993, pp. 1-223. |
| [27] |
The World Bank. Making Services Work for Poor People, World Development Report, pp. 1-271. Available from:
https://documents1.worldbank.org/curated/en/832891468338681960/pdf/268950WDR00PUB0ces0work0poor0people.pdf [Accessed 20 October 2025]. |
| [28] | Badruzzaman, M. Controversial issues of section-57 of the ICT Act, 2006: A Critical Analysis and Evaluation, Journal of Humanities and Social Science. 2016, 21(1), 62-71. |
APA Style
Ferdous, S. (2025). Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats. Humanities and Social Sciences, 13(6), 590-599. https://doi.org/10.11648/j.hss.20251306.19
ACS Style
Ferdous, S. Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats. Humanit. Soc. Sci. 2025, 13(6), 590-599. doi: 10.11648/j.hss.20251306.19
@article{10.11648/j.hss.20251306.19,
author = {Sahely Ferdous},
title = {Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats},
journal = {Humanities and Social Sciences},
volume = {13},
number = {6},
pages = {590-599},
doi = {10.11648/j.hss.20251306.19},
url = {https://doi.org/10.11648/j.hss.20251306.19},
eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.hss.20251306.19},
abstract = {Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such as the 2016 Bangladesh Bank heist and recurring data breaches, reveal that the nation’s security challenges extend beyond technology. This article applies a constructivist theoretical framework to argue that cybersecurity in Bangladesh should be socially constructed through shared meanings, political narratives, and institutional identities rather than determined solely by material capacity. Drawing on the foundational insights of Onuf, Wendt, and Finnemore, it contends that the country’s laws and policies, such as the Information and Communication Technology (ICT) Act (2006) and the Digital Security Act (2018), reflect the internalisation of state-centric norms that privilege control and reputation management over transparency and citizen trust. Through interpretive analysis of policy documents, legislative instruments, and media discourses, the study demonstrates that the prevailing cybersecurity narrative in Bangladesh equates resilience with regime stability and technological modernity. Constructivist reasoning reframes this narrative by highlighting how institutional legitimacy, social trust, and professional identity shape security behaviour. Further, research shows that international frameworks, such as the International Organisation for Standardisation/International Electrotechnical Commission (ISO/IEC) 27001 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, contribute to global norm diffusion but achieve a long-term impact only when locally internalised. Ultimately, the study concludes that Bangladesh’s cybersecurity resilience depends not merely on technological and legislative reforms but on reconstructing the social meanings that underpin governance. By embedding openness, inclusivity, and accountability into institutional culture, Bangladesh can transform cybersecurity from a domain of control into a collective practice of trust and responsibility.},
year = {2025}
}
TY - JOUR T1 - Constructing Cybersecurity: A Constructivist Analysis of Bangladesh’s Response to Emerging Digital Threats AU - Sahely Ferdous Y1 - 2025/12/27 PY - 2025 N1 - https://doi.org/10.11648/j.hss.20251306.19 DO - 10.11648/j.hss.20251306.19 T2 - Humanities and Social Sciences JF - Humanities and Social Sciences JO - Humanities and Social Sciences SP - 590 EP - 599 PB - Science Publishing Group SN - 2330-8184 UR - https://doi.org/10.11648/j.hss.20251306.19 AB - Bangladesh’s rapid digital transformation under the national vision of “Digital Bangladesh” has created both opportunities and vulnerabilities within cyberspace. As financial systems, e-governance, and communication networks expand, cyber incidents, such as the 2016 Bangladesh Bank heist and recurring data breaches, reveal that the nation’s security challenges extend beyond technology. This article applies a constructivist theoretical framework to argue that cybersecurity in Bangladesh should be socially constructed through shared meanings, political narratives, and institutional identities rather than determined solely by material capacity. Drawing on the foundational insights of Onuf, Wendt, and Finnemore, it contends that the country’s laws and policies, such as the Information and Communication Technology (ICT) Act (2006) and the Digital Security Act (2018), reflect the internalisation of state-centric norms that privilege control and reputation management over transparency and citizen trust. Through interpretive analysis of policy documents, legislative instruments, and media discourses, the study demonstrates that the prevailing cybersecurity narrative in Bangladesh equates resilience with regime stability and technological modernity. Constructivist reasoning reframes this narrative by highlighting how institutional legitimacy, social trust, and professional identity shape security behaviour. Further, research shows that international frameworks, such as the International Organisation for Standardisation/International Electrotechnical Commission (ISO/IEC) 27001 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework, contribute to global norm diffusion but achieve a long-term impact only when locally internalised. Ultimately, the study concludes that Bangladesh’s cybersecurity resilience depends not merely on technological and legislative reforms but on reconstructing the social meanings that underpin governance. By embedding openness, inclusivity, and accountability into institutional culture, Bangladesh can transform cybersecurity from a domain of control into a collective practice of trust and responsibility. VL - 13 IS - 6 ER -